Patient Portal Puts a Spotlight on Secure Messaging


For healthcare professionals participating in the Centers for Medicare & Medicaid Services electronic health record (EHR) incentive program, you’ll soon need to demonstrate compliance with the Stage 2 Meaningful Use requirements in order to continue receiving incentive payments. Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care.

Internet Two Seeks Chief Cyberinfrastructure Security Officer


Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO reports to the Vice President for Network Services and will have responsibility for security across all Internet2 infrastructure programs. By Bob Gourley.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk


FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.

Cyber Catalyst Brings Minimal Value To Businesses

Forrester's Customer Insights

In late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. cybersecurity information security Insurance security & risk Cyberinsurance

Impact of technology on insurance industry

Hacker Earth

Like every other industry, the global insurance sector, worth over $5 trillion, has undergone an immense overhaul because of disruptive technologies in recent years. Admittedly, the insurance industry (risk, premium, claims) has been slow to keep pace with digitization and are only slowly beginning to grasp the power of becoming more customer-centric and offering faster response times, increased transparency. IT security (53%). How many use chatbots in the insurance industry?

NY regulation aims to raise bank security standards

Network World

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal. Under the new regulations, banks and insurance companies doing business in New York State will need to establish a cybersecurity program, appoint a Chief Information Security Officer and monitor the cybersecurity policies of their business partners.

Federal Government Signals Interest In Several Key Leading Edge Technologies


One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). By Bob Gourley.

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined. ” I love this definition because it addresses all of the things that a security program needs to be. Security vs Compliance.

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health


I’ve informed the Amazon team of a feature request from my wife, who would like to receive an emailed report on my tone of voice at the end of each day. The band is comfortable to wear, and the programs in the app are useful. A few weeks ago, I started wearing a new health band.

The Sony Hack in Context


The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. National Security Risks. By Chris Mellon.

Expanding the Cloud – The Second AWS GovCloud (US) Region, AWS GovCloud (US-East)

All Things Distributed

The new AWS GovCloud (US-East) Region also meets the top US government compliance requirements, including: Federal Risk and Authorization Management Program (FedRAMP) Moderate and High baselines. Federal Information Security Management Act (FISMA) Low, Moderate, and High baselines. Department of Justice's Criminal Justice Information Services (CJIS) Security Policy. Payment Card Industry (PCI) Security.

Enterprise IT Security: The Wake-Up Call is Getting Louder

The Investing Edge

I attended two local industry events recently that highlighted the substantial gap that exists between hackers’ abilities and the average corporation’s information security defenses. While we’ve been watching the security industry closely and work with several portfolio companies in this area, it’s nonetheless unsettling how far behind the average corporation is, and how daunting the chasm is between where they are and where they need to be.

The New Cybersecurity Threat Landscape

CIO Dashboard

In the last few months researchers and security experts have pulled off a series of technology demonstrations that should send a chill down the spines of senior executives and push cybersecurity up the list of priorities. Defacing websites, stealing customer data and holding information hostage will look like child’s play in comparison to recent bone-chilling demonstrations in the domain of the Internet of Things. How does our cybersecurity program compare to the competition?

27 New Cybersecurity Measures In Approved Defense Bill

SecureWorld News

27 of the information security provisions come directly from Cyberspace Solarium Commission (CSC) recommendations for improving US cybersecurity posture. The bill also includes new qualifications for becoming Director of the Cybersecurity and Infrastructure Security Agency (CISA).

What has NIST done for me lately?

Cloud Musings

According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries.

Dell 81